Advanced Network Security: - Lecture# 4-1 - By: - Syed Irfan Ullah - Abasyn University Peshawar
Advanced Network Security: - Lecture# 4-1 - By: - Syed Irfan Ullah - Abasyn University Peshawar
• Lecture# 4-1
• By:
• Syed Irfan Ullah
• Abasyn University Peshawar
Hash algorithm
• A hash function (or hash algorithm) is a
reproducible method of turning data
(usually a message or a file) into a number
suitable to be handled by a computer. These
functions provide a way of creating a small
digital "fingerprint" from any kind of data.
The function chops and mixes (i.e.,
substitutes or transposes) the data to create
the fingerprint, often called a hash value.
Cont’d
• The hash value is commonly represented in
hexadecimal notation. A good hash function
is one that yields few hash collisions in
expected input domains. In hash tables and
data processing, collisions inhibit the
distinguishing of data, making records more
costly to find.
Cont’d
• In cryptography, a cryptographic hash function
is a hash function with certain additional security
properties to make it suitable for use as a primitive
in various information security applications, such
as authentication and message integrity. A hash
function takes a long string (or 'message') of any
length as input and produces a fixed length string
as output, sometimes termed a message digest or
a digital fingerprint.
Cont’d
• In various standards and applications, the
two most-commonly used hash functions
are MD5 and SHA-1.
• In 2005, security flaws were identified in
both algorithms
Cont’d
Ciphering Mechanisms
• Stream cipher
• Block cipher
Stream cipher
• In cryptography, a stream cipher is a
symmetric cipher in which the plaintext digits are
encrypted one at a time, and in which the
transformation of successive digits varies during the
encryption.
• http://en.wikipedia.org/wiki/Block_cipher
Chap. 7
Points of Vulnerability
Link vs. End-to-End Encryption
• The most powerful and most
common approach to securing
the points of vulnerability is
encryption
• If encryption is to be used to
counter these attacks, need to
decide what to encrypt and
where the encryption should be
located
• Two fundamental alternatives:
– Link encryption
– End-to-end encryption
Link vs. End-to-End Encryption
• Link encryption
– Encryption occurs independently on every link
– Must decrypt traffic between links in order to route the frames
– Requires many devices, but paired keys
• End-to-end encryption
– Encryption occurs between original source and final destination
– Needs devices at each end with shared keys
– Must leave headers in clear so that network correctly routes information
– Contents are protected, but traffic pattern flows are not
• Ideally want both at once
– End-to-end protects data contents over entire path and provides
authentication
– Link protects traffic flows from monitoring
Location of Encryption Device
• Link encryption:
– A lot of encryption devices
– High level of security
– Decrypt each packet at every switch
• End-to-end encryption
– The source encrypt and the receiver decrypts
– Payload encrypted
– Header in the clear
• High Security: Both link and end-to-end encryption
are needed (see Figure 2.9)
Link vs. End-to-End Encryption
Logical Placement of E2E Encryption Function
• Link encryption occurs at either the physical or link layers
• For end-to-end encryption, several choices are possible
• At the lowest practical layer, the encryption function could be
performed at network layer
• All the user processes and applications within each end system
would employ the same encryption scheme with the same key
• With this arrangement, front-end processor may be used to off-
load the encryption function
Logical Placement of E2E Encryption Function
Network Network IP IP
Data link Data link Data link Data link
DataData
Link.H Net-H IP-H TCP.H Link- T
In Gateways
Traffic Confidentiality
• Security from traffic analysis attack
– Knowledge about the number and length of messages
between nodes may enable an opponent to determine who is
talking to whom
© ©